Multi-Factor Security System With Portable Devices And Security Kernels

a security system and portable device technology, applied in the field of user security authentication, can solve the problems of liable to remain unused in the security system that is not easy and convenient, and achieve the effects of increasing speed, popular acceptance, and increasing speed

Inactive Publication Date: 2007-12-06
FORTRESS GB
View PDF16 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0045] Many contactless smart cards also have contact capability for increased speed and popular acceptance. Such a smart card is able to perform both the normal contactless tasks, and, when in contact mo

Problems solved by technology

This is particularly important, because a security system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-Factor Security System With Portable Devices And Security Kernels
  • Multi-Factor Security System With Portable Devices And Security Kernels
  • Multi-Factor Security System With Portable Devices And Security Kernels

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0059] The principles and operation of a method and apparatus according to the present invention may be understood with reference to the drawings and the accompanying description.

[0060] In the following embodiments of the present invention, a contactless smart card is used in combination with one or more other devices to allow mutual authentication among them.

[0061]FIG. 1A is a conceptual diagram of a prior-art computer peripheral device 30 (a mass storage device) with an interface connector 40. FIG. 1B is a conceptual diagram of such a device 200 according to an embodiment of the present invention, wherein device 200 is coupled to a contactless smart card 100 belonging to a user 50. On device 200 is a keypad 210 which communicates directly with an internal secure processor within device 200, without revealing keypad action to the external host computer. Within keypad 210 is an antenna 220 and a transceiver (not shown) for communicating with smart card 100. A connector 230 enables...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A system for multi-factor security involving multiple secure devices that distribute the secured functions of the system over the different devices, such that the loss or theft of any one of them does not compromise the overall security of the system. Moreover, a configuration of devices is also secure even if one of them has been attacked by malicious software agents, such as “keyboard sniffers”. A novel contactless smart card reader (200) is presented that incorporates a transceiver antenna (220) within a keypad (210) of a device used with contactless smart cards (100). When the card (100) is pressed against the device's keypad (210), the transceiver (220) of the device establishes a session with the smart card (100). A variety of systems are presented, including those using mobile telephones, computer-interfaced card readers, personal digital appliances, and television set-top box remote controllers.

Description

FIELD OF THE INVENTION [0001] The present invention relates to user security authentication, and, more particularly, to digital devices for activating computer startup and log-in, and controlled activation of cryptographic and other security processes. BACKGROUND OF THE INVENTION [0002] Portable devices, such as mobile phones, set-top box controllers, secured memory controllers and Personal Digital Assistants (PDA's) have many of the attributes of smart cards as personal identifiers, with their implied promise of confidentiality of communicated and stored data. Users trust mobile phones, assuming that they are typically less prone than personal computers to viral attacks. Users also appreciate the reliability and the sensation of instantaneous system response to their keypad instructions. As a result of Wi-Fi, Bluetooth, and Internet access, the functional differences between such portable devices is becoming blurred. [0003] Offsetting the advantages of portable devices, however, is...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G08B29/00H04L9/32G06F7/04G06F13/00G06F17/30G06F21/00G06K19/00G07C9/00G07F7/10G11C7/00G11C7/24H04L9/00
CPCG06F21/35G06Q20/341G06Q20/346G11C7/24G07C9/00039G07F7/1008G06Q20/40145G07C9/23
Inventor GRESSEL, CARMI DAVIDVAGO, GABRIELGRANOT, RANKANZA, TORNERAPPLE, UZIHECHT, AVI
Owner FORTRESS GB
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products